EnumVolcano is an open source Bash script which is used to perform automated enumeration for privilege escalation. This tool is dedicated to ethical hackers, red teamers, blue teamers & security analysts.
☆23May 8, 2022Updated 3 years ago
Alternatives and similar repositories for EnumVolcano
Users that are interested in EnumVolcano are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- This is a windows maching login page designed using HTML, CSS and JS. This can be used for red teaming or cybersecurity awareness related…☆18Mar 25, 2022Updated 4 years ago
- A windows kernel driver to Block symbolic link exploit used for privilege escalation.☆15Jul 30, 2020Updated 5 years ago
- Useful Windows and AD tools☆15Feb 20, 2022Updated 4 years ago
- ☆12Oct 9, 2022Updated 3 years ago
- WebPathScanner helps pentester or web developer to find some interesting files( like .htaccess, .htpasswd ..etc) for improving the securi…☆24May 8, 2022Updated 3 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- ☆17Aug 27, 2022Updated 3 years ago
- Passive Security Tools Fingerprinting Framework☆75Mar 26, 2021Updated 5 years ago
- Rust Weaponization for Red Team Engagements.☆12Nov 14, 2022Updated 3 years ago
- A prototype malware C2 channel using x509 certificates over mTLS☆152Mar 15, 2024Updated 2 years ago
- SecLists is the security tester's companion. It is a collection of multiple types of lists used during security assessments. List types i…☆14Mar 29, 2016Updated 10 years ago
- Scan a host for open HTTP ports and gain information about the services present.☆12Jul 20, 2022Updated 3 years ago
- Cumulonimbus-UAL_Extractor is a PowerShell based tool created by the Tesorion CERT team to help gather the Unified Audit Logging out of a…☆21Oct 25, 2023Updated 2 years ago
- Make an executable run with TrustedInstaller permissions under SYSTEM account.☆46Nov 16, 2020Updated 5 years ago
- Resources for AD penetration testing and security☆33Feb 21, 2022Updated 4 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- This a Complete tool contained box for Capture The Flag competition. Mostly I have inserted all the necessary tools. Some of the people h…☆11Apr 16, 2022Updated 4 years ago
- ssb=simple subdomain bruteforcer☆20Mar 10, 2023Updated 3 years ago
- Component Services Volatile Environment LPE☆12Jun 28, 2025Updated 10 months ago
- PoC code for CVE-2020-16939 Windows Group Policy DACL Overwrite Privilege Escalation☆12Oct 27, 2020Updated 5 years ago
- Supporting material for the "Hunting Bugs In The Tropics" DEFCON 30 talk☆10Aug 18, 2022Updated 3 years ago
- Code and notes regarding Malware Development☆11Oct 30, 2022Updated 3 years ago
- Terminal based fake identity generator.☆26Aug 23, 2023Updated 2 years ago
- OSINT tools catalog☆16Sep 12, 2021Updated 4 years ago
- Extensible MacOS system telemetry generator.☆56Apr 12, 2026Updated 3 weeks ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Aliases and functions for the lazy penetration tester☆69Jan 28, 2024Updated 2 years ago
- the Open Source Windows Privilege Escalation Guide☆10Mar 16, 2017Updated 9 years ago
- ☆13Apr 6, 2016Updated 10 years ago
- Application Security pipelines☆51May 25, 2022Updated 3 years ago
- A simple program to query nmap xml files in the terminal.☆27May 4, 2020Updated 6 years ago
- ☆12Apr 20, 2025Updated last year
- A customizable, easy-to-navigate tool for researching, pen testing, and defending with the power of Shodan.☆121Jul 6, 2024Updated last year
- Forblaze - A Python Mac Steganography Payload Generator☆56Mar 7, 2022Updated 4 years ago
- A python script to check if URLs are allowed or disallowed by a robots.txt file.☆23Feb 11, 2025Updated last year
- Deploy open-source AI quickly and easily - Special Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- mift - a mobile image forensic toolkit☆47Nov 14, 2023Updated 2 years ago
- PyQT5 app for LOLBAS and GTFOBins☆45May 3, 2022Updated 4 years ago
- Ironsharp is a tool written in C# that detects CVEs caused by missing updates and privilege escalation vulnerabilities caused by misconfi…☆33Jun 28, 2022Updated 3 years ago
- A PHP script demonstrating cookie stealing by capturing and logging request information, including the victim's cookie, IP address, HTTP …☆37Jun 15, 2023Updated 2 years ago
- Checks for search order privilege escalation vectors in system environment, system shared objects and executable files in $PATH.☆18Aug 6, 2021Updated 4 years ago
- ☆10Aug 9, 2024Updated last year
- Generate FUD Ransomeware For Windows, Linux and MAC OS☆22Oct 21, 2023Updated 2 years ago